A possible hacker could exploit this to execute arbitrary FTP commands on the
server and due to similiarities between the FTP and the SMTP protocol,
this vulnerability also allows a possible hacker to connect to a SMTP server
and issue arbitrary commands, for example sending an email.